Get new jobs by email
Search Results
- ...About the Role: We are seeking a motivated Information Security Specialist with a strong foundation in compliance frameworks and offensive security. The ideal candidate will have hands-on experience with ISO 27001, HIPAA, SOC 2, as well as practical skills in penetration...
- ...ABOUT THE ROLE We are seeking an experienced Manager, Information Security GRC and Data Protection to lead our efforts in ensuring that our products, processes, and organization adhere to legal, regulatory, and ethical standards. In this role, you will oversee...
- ...send money across border in over 100 countries. Overview: Ace Money Transfer is seeking a highly experienced and dynamic Cyber Security Manager to lead and mentor both our Offensive (Red Team) and Defensive (Blue Team) security teams. This critical role will be...
- ...Managed IT Services company (Managed Service Provider). Since 1997 we have specialized in providing managed IT services and managed security services for our clients. which are made up of small to medium-sized enterprises. We are looking for highly passionate individuals...
- ...alert: Location: Lahore, Pakistan Company: Nestlé Pakistan Full-time: On site Experience: 10 plus years of experience in security operations Qualification: Bachelor’s/Master’s from a recognized institution Position Summary This role is pivotal in...
- ...joining an agile and talented Finance team here at Mous! Please note that this role will be situated at our office in Lahore (Upper Mall), working on-site from Monday to Thursday, with Friday being an optional WFH day. The normal working hours will be 10 am - 7 pm PKT....
- ...career in supply chain, we’d love to hear from you. Please note that this role will be situated at our office in Lahore (Upper Mall), working on-site from Monday-Thursday, with Friday being an optional WFH day. The normal working hours will be 8am – 5pm PKT but may...
- ...-growing tech accessories brand, this is your moment. Please note that this role will be situated at our office in Lahore (Upper Mall), working on-site from Monday to Thursday, with Friday being an optional WFH day. The normal working hours will be 10 am - 7 pm PKT....
- ...staff for visitor needs. Respond to front desk inquiries and route them to appropriate departments efficiently. Coordinate with security and admin team for guest clearance and staff protocols. Maintain daily logbooks, front desk checklists, and visitor records....
- ...Position Title: Security Analyst (SOC Analyst) Job Type: Full-time The Security Analyst I role is a critical position within the organization. The primary function of the role will be to provide monitoring of deployed customer environments for security events...
- ...architectures leveraging technologies such as Apache Spark (PySpark), Delta Lake, Iceberg, and Parquet. Establish governance, security, and compliance frameworks across data platforms and pipelines. Set standards for data orchestration using tools like Apache...
- ...technologies, and competitive landscape to drive innovation in advertising approaches. Negotiate contracts and media buys to secure cost-effective and impactful placements. Ensure all advertising content complies with legal, ethical, and brand standards....
150000 - 200000 PKR
...Network Administration Install and maintain Windows Servers and Active Directory. Configure Group Policies, file shares, and security protocols. Monitor server health, storage, and implement backup/disaster recovery plans. Web Hosting & Application...- ...Services company (Managed Service Provider). Since 1996 we have specialized in providing a full range of services from Network & Security, UNIX/Linux & Windows Engineering, System & Database Administration, on-premise and cloud services, Help Desk Support, VoIP Support...
- ...Delivery (CI/CD) pipelines using GitHub Actions or other tools to automate builds, tests, and deployments Implement and enforce security best practices within GitHub, including access control, secret management, and vulnerability scanning. Ability to understand...
- ...Kubernetes or other containerized orchestration platforms ~ Basic knowledge of cloud technologies (e.g., AWS, GCP) ~ Familiarity with security is best practiced in cloud and containerized environments. ~ Ability to write unit tests, integration tests, and provide clean,...
- ...as AI for fraud detection, automation for seamless transactions, and partnerships with global leaders like Mastercard, we provide secure, user-friendly, and accessible financial solutions that adapt to the evolving needs of a global customer base. As we scale our EMI...
- ...forecasts, and strategic recommendations that help stakeholders make informed decisions about resource use, farm management, food security, and agribusiness operations. Key Responsibilities: Conduct research and analysis on agricultural markets, commodity...
- ...reports, dashboards, and data analytics solutions. Troubleshooting and debugging ERP system issues. Ensuring data integrity, security, and compliance with best practices. Collaborating with functional analysts to translate business requirements into technical...
- ...reliability, and cost efficiency, leveraging Ansible, scripting (with PowerShell or Bash) and other automation technologies. Implement security best practices for web applications, including least privileged, CIS benchmark baselining, vulnerability management, etc. Draft...Remote job